{"id":"https://openalex.org/W2785873973","doi":"https://doi.org/10.1109/pimrc.2017.8292209","title":"SIMON 32/64 and 64/128 block cipher: Study of cross correlation and linear span attack immunity","display_name":"SIMON 32/64 and 64/128 block cipher: Study of cross correlation and linear span attack immunity","publication_year":2017,"publication_date":"2017-10-01","ids":{"openalex":"https://openalex.org/W2785873973","doi":"https://doi.org/10.1109/pimrc.2017.8292209","mag":"2785873973"},"language":"en","primary_location":{"id":"doi:10.1109/pimrc.2017.8292209","is_oa":false,"landing_page_url":"https://doi.org/10.1109/pimrc.2017.8292209","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5073500309","display_name":"Ahmad Sghaier Omar","orcid":"https://orcid.org/0000-0002-7896-9255"},"institutions":[{"id":"https://openalex.org/I151746483","display_name":"University of Waterloo","ror":"https://ror.org/01aff2v68","country_code":"CA","type":"education","lineage":["https://openalex.org/I151746483"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Ahmad Sghaier Omar","raw_affiliation_strings":["Electrical and Computer Engineering Department, University of Waterloo, Waterloo, ON, Canada"],"affiliations":[{"raw_affiliation_string":"Electrical and Computer Engineering Department, University of Waterloo, Waterloo, ON, Canada","institution_ids":["https://openalex.org/I151746483"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5031048152","display_name":"Otman Basir","orcid":"https://orcid.org/0000-0002-6454-0538"},"institutions":[{"id":"https://openalex.org/I151746483","display_name":"University of Waterloo","ror":"https://ror.org/01aff2v68","country_code":"CA","type":"education","lineage":["https://openalex.org/I151746483"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Otman Basir","raw_affiliation_strings":["Electrical and Computer Engineering Department, University of Waterloo, Waterloo, ON, Canada"],"affiliations":[{"raw_affiliation_string":"Electrical and Computer Engineering Department, University of Waterloo, Waterloo, ON, Canada","institution_ids":["https://openalex.org/I151746483"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5073500309"],"corresponding_institution_ids":["https://openalex.org/I151746483"],"apc_list":null,"apc_paid":null,"fwci":0.195,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.64999075,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/block-cipher","display_name":"Block cipher","score":0.721578061580658},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.70955890417099},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.6784964799880981},{"id":"https://openalex.org/keywords/cipher","display_name":"Cipher","score":0.6601195335388184},{"id":"https://openalex.org/keywords/stream-cipher","display_name":"Stream cipher","score":0.6009817123413086},{"id":"https://openalex.org/keywords/power-analysis","display_name":"Power analysis","score":0.5803223252296448},{"id":"https://openalex.org/keywords/realization","display_name":"Realization (probability)","score":0.5134640336036682},{"id":"https://openalex.org/keywords/block","display_name":"Block (permutation group theory)","score":0.5037023425102234},{"id":"https://openalex.org/keywords/correlation-attack","display_name":"Correlation attack","score":0.48455825448036194},{"id":"https://openalex.org/keywords/span","display_name":"Span (engineering)","score":0.4831966161727905},{"id":"https://openalex.org/keywords/linear-span","display_name":"Linear span","score":0.4275054931640625},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.41144871711730957},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.36629706621170044},{"id":"https://openalex.org/keywords/computer-engineering","display_name":"Computer engineering","score":0.3489627242088318},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.33405226469039917},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.19372975826263428},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.18006429076194763},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.14973753690719604},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.1378370225429535},{"id":"https://openalex.org/keywords/discrete-mathematics","display_name":"Discrete mathematics","score":0.09144216775894165},{"id":"https://openalex.org/keywords/statistics","display_name":"Statistics","score":0.07408836483955383}],"concepts":[{"id":"https://openalex.org/C106544461","wikidata":"https://www.wikidata.org/wiki/Q543151","display_name":"Block cipher","level":3,"score":0.721578061580658},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.70955890417099},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.6784964799880981},{"id":"https://openalex.org/C2780221543","wikidata":"https://www.wikidata.org/wiki/Q4681865","display_name":"Cipher","level":3,"score":0.6601195335388184},{"id":"https://openalex.org/C92950451","wikidata":"https://www.wikidata.org/wiki/Q864718","display_name":"Stream cipher","level":3,"score":0.6009817123413086},{"id":"https://openalex.org/C71743495","wikidata":"https://www.wikidata.org/wiki/Q2845210","display_name":"Power analysis","level":3,"score":0.5803223252296448},{"id":"https://openalex.org/C2781089630","wikidata":"https://www.wikidata.org/wiki/Q21856745","display_name":"Realization (probability)","level":2,"score":0.5134640336036682},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.5037023425102234},{"id":"https://openalex.org/C120226833","wikidata":"https://www.wikidata.org/wiki/Q5172844","display_name":"Correlation attack","level":4,"score":0.48455825448036194},{"id":"https://openalex.org/C2778753569","wikidata":"https://www.wikidata.org/wiki/Q1960395","display_name":"Span (engineering)","level":2,"score":0.4831966161727905},{"id":"https://openalex.org/C133226019","wikidata":"https://www.wikidata.org/wiki/Q209812","display_name":"Linear span","level":2,"score":0.4275054931640625},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.41144871711730957},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.36629706621170044},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.3489627242088318},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.33405226469039917},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.19372975826263428},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.18006429076194763},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.14973753690719604},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.1378370225429535},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.09144216775894165},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.07408836483955383},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C147176958","wikidata":"https://www.wikidata.org/wiki/Q77590","display_name":"Civil engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/pimrc.2017.8292209","is_oa":false,"landing_page_url":"https://doi.org/10.1109/pimrc.2017.8292209","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W2480035874","https://openalex.org/W2610964475","https://openalex.org/W2951060902","https://openalex.org/W2952086763","https://openalex.org/W3030624396","https://openalex.org/W3212427905","https://openalex.org/W6763960458","https://openalex.org/W6763995240","https://openalex.org/W6778727884","https://openalex.org/W6803683437"],"related_works":["https://openalex.org/W88466764","https://openalex.org/W4389258758","https://openalex.org/W4245501402","https://openalex.org/W2533921573","https://openalex.org/W2545039056","https://openalex.org/W3174959224","https://openalex.org/W2149094354","https://openalex.org/W1979198062","https://openalex.org/W3044322697","https://openalex.org/W4313008406"],"abstract_inverted_index":{"Power":[0],"and":[1,19,35,45,66,79],"computing":[2,44],"limitations":[3],"hinder":[4],"the":[5,33,96,103,115],"ability":[6],"of":[7,25,37,53,133,135],"many":[8],"devices":[9,21],"to":[10,73,88,110,125],"support":[11],"stringent":[12],"security":[13],"protocols.":[14],"Smart":[15],"sensors,":[16],"RFID":[17],"tags,":[18],"wearable":[20],"are":[22],"typical":[23],"examples":[24],"such":[26],"devices.":[27],"Lightweight":[28],"cryptography":[29,38,58],"is":[30,69,92,100,107],"concerned":[31],"with":[32,42,130],"design":[34],"implementation":[36],"algorithms":[39],"in":[40,62,71,137],"environments":[41],"limited":[43],"power":[46],"resources.":[47],"This":[48],"paper":[49],"presents":[50],"a":[51,54,119,131],"realization":[52],"hardware":[55],"efficient":[56],"lightweight":[57],"block":[59,85,105],"cipher":[60,106],"SIMON":[61],"C/C++":[63],"(SIMON":[64],"32/64":[65],"64/128).":[67],"Analysis":[68],"performed":[70],"order":[72],"investigate":[74],"its":[75],"input/output":[76],"cross":[77],"correlation":[78],"among":[80],"output":[81],"sets.":[82],"The":[83],"proposed":[84,104],"cipher's":[86],"immunity":[87],"linear":[89,111,120],"span":[90,112,121],"attacks":[91],"also":[93],"investigated":[94],"using":[95],"Berlekamp-Massy":[97],"algorithm.":[98],"It":[99],"concluded":[101],"that":[102],"not":[108],"immune":[109],"attacks,":[113],"as":[114],"analysis":[116],"has":[117],"shown":[118],"for":[122],"certain":[123],"components":[124],"be":[126],"less":[127],"than":[128],"N/2,":[129],"profile":[132],"probability":[134],"1/3":[136],"1":[138],"million":[139],"iterations.":[140]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
